WEBINAR

ON-DEMAND

Google API Keys Weren't Secrets. But then Gemini Changed the Rules.

Google told developers for years that API keys were safe to embed in public code. Then Gemini changed that. When the Gemini API is enabled on a project, those same public keys can silently gain access to private Gemini data with no warning. Threat actors can access uploaded files, cached data, and rack up charges on users’ accounts. 

We found nearly 3,000 exposed keys in the wild, including on Google's own infrastructure, affecting users who were simply following official guidance.

In this webinar, we'll cover:

  • How this privilege escalation works and why it's so easy to miss

  • What attackers can do with a key scraped from your public webpage

  • How to audit your GCP projects and fix your exposure today

  • Where Google is headed with key management

infra